Static task
static1
Behavioral task
behavioral1
Sample
85187d63d9385e0e8a8d4ef336056c14598ef5a06a56e0e37b1774546fa6e572.exe
Resource
win7-20220812-en
General
-
Target
85187d63d9385e0e8a8d4ef336056c14598ef5a06a56e0e37b1774546fa6e572
-
Size
354KB
-
MD5
62b29a8f2f2a900286eef73f0fea6cd1
-
SHA1
e2483328a11e0864afe26e6b76de79d86140f6f8
-
SHA256
85187d63d9385e0e8a8d4ef336056c14598ef5a06a56e0e37b1774546fa6e572
-
SHA512
88a6f30ed6bf4c5d2e41e2fbc2d01c5a334feb383ade1387a5e9ed9f0b4ef6ed16aeef1d6a11bc64898de0f819c78702810d6af6cfcff11eee0efede92dd24e6
-
SSDEEP
6144:Xysj/gzqGQP+xwjEDSMZDn0QkRf8XbTRNdnM581sWJWL:XypQP+mEzCQk1aRNNM
Malware Config
Signatures
Files
-
85187d63d9385e0e8a8d4ef336056c14598ef5a06a56e0e37b1774546fa6e572.exe windows x86
0a3807ee6e0ec29f1e1c2bf299770331
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
cfgmgr32
CM_Locate_DevNodeA
CM_Reenumerate_DevNode
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathFileExistsA
PathIsUNCA
kernel32
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
CreateFileA
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
SetErrorMode
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
VirtualQuery
RtlUnwind
SetEnvironmentVariableA
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
SetStdHandle
GetFileType
HeapSize
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
WritePrivateProfileStringA
GetTickCount
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
InterlockedExchange
MultiByteToWideChar
WideCharToMultiByte
GetLastError
SizeofResource
LockResource
LoadResource
FindResourceA
GetVersion
CompareStringA
CompareStringW
lstrlenA
GetVersionExA
GetProcAddress
LoadLibraryA
lstrcpynA
CreateMutexA
DeleteFileA
SetFileAttributesA
GetModuleHandleA
CloseHandle
Sleep
WaitForSingleObject
GetCurrentThread
QueryPerformanceCounter
TerminateProcess
CreateProcessA
FindClose
lstrcmpA
FileTimeToSystemTime
GetThreadLocale
GetOEMCP
GetCPInfo
GlobalFlags
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
FindNextFileA
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
GetModuleFileNameA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
SetLastError
SetCurrentDirectoryA
GetCurrentDirectoryA
GetWindowsDirectoryA
GetExitCodeProcess
OutputDebugStringA
GetSystemDirectoryA
FreeLibrary
FindFirstFileA
user32
UnregisterClassA
LoadCursorA
GetSysColorBrush
DestroyMenu
SetCursor
GetMessageA
GetCursorPos
ValidateRect
PostQuitMessage
GetWindowThreadProcessId
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
IsWindowEnabled
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
EnableWindow
SendMessageA
CharUpperA
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetParent
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetSysColor
wsprintfA
GetDesktopWindow
DispatchMessageA
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjects
DrawIcon
AppendMenuA
GetSystemMenu
IsIconic
GetClientRect
FlashWindow
LoadIconA
GetSystemMetrics
GetSubMenu
GetMenuItemCount
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuState
GetMenuItemID
gdi32
GetObjectA
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetStockObject
DeleteObject
GetClipBox
SetMapMode
SetTextColor
GetDeviceCaps
SaveDC
RestoreDC
SetBkColor
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE